Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Parallel key exchange

Authors
Jeong, Ik RaeLee, Dong Hoon
Issue Date
2008
Publisher
GRAZ UNIV TECHNOLGOY, INST INFORMATION SYSTEMS COMPUTER MEDIA-IICM
Keywords
key exchange; key graph; security notions; randomness re-use
Citation
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, v.14, no.3, pp.377 - 396
Indexed
SCIE
SCOPUS
Journal Title
JOURNAL OF UNIVERSAL COMPUTER SCIENCE
Volume
14
Number
3
Start Page
377
End Page
396
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/125552
ISSN
0948-695X
Abstract
In the paper we study parallel key exchange among multiple parties. The status of parallel key exchange can be depicted by a key graph. In a key graph, a vertex represents a party and an edge represents a relation of two parties who are to share a key. We first propose a security model for a key graph, which extends the Bellare-Rogaway model for two-party key exchange. Next, we clarify the relations among the various security notions of key exchange. Finally, we construct an efficient key exchange protocol for a key graph using the randomness re-use technique. Our protocol establishes the multiple keys corresponding to all edges of a key graph in a single session. The security of our protocol is proven in the standard model.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE